Skip to main content
Threat actor using a fishing rod to obtain information

the anatomy of a hack

CHAPTER 1: The Collector

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Auteurs de menaces utilisant une canne à pêche pour obtenir des informations

L’anatomie d’un piratage

CHAPITRE 1 : Le collectionneur

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Unsuspecting victim of cyber threats on their computer

the anatomy of a hack

CHAPTER 2: The In

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Victime sans méfiance de cybermenaces sur son ordinateur

L’anatomie d’un piratage

CHAPITRE 2: L’entrée

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Cyber security professionals fighting against threats

the anatomy of a hack

CHAPTER 3: The Set Up

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Professionnels de la cybersécurité luttant contre les menaces

L’anatomie d’un piratage

CHAPITRE 3: La mise en place

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
A person has been locked out of their computer

the anatomy of a hack

CHAPTER 4: The Long Game

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
  • Article
Une personne a été bloquée hors de son ordinateur

L’anatomie d’un piratage

CHAPITRE 4: La stratégie à long terme

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
  • Article
Man sitting at a desk with a computer and a target on him

the anatomy of a hack

Kick-off

  • Blog
  • Video
  • Quizzes
Un homme assis à un bureau avec un ordinateur et une cible sur lui

L’anatomie d’un piratage

Lancement

  • Blogues
  • Vidéo
  • Questionnaires

Knowledge Library

banner-image-csam-phishing

Bibliothèque des connaissances

banner-image-csam-phishing

Cyber Security Resources

Videos

Decorative banner image People gathering to seek knowledge on Cyber Security

RESSOURCES EN CYBERSÉCURITÉ

Vidéos

Decorative banner image People gathering to seek knowledge on Cyber Security
Cyber Security Resources / Knowledge Library / Category 1
Cyber Security Resources / Knowledge Library
Cyber Galaxy Defenders
{{tokens_earned}}
token
{{$t('messages.galaxy_tokens_earned')}}
{{tokens_earned}}
token
people on conference bell icon

New Year’s Cyber Security Games
Play Now

Play Game 1

Play Game 2

Jeux de cybersécurité du Nouvel An
joue maintenant

Jouez le jeu 1

Jouez le jeu 2

icon of girl using laptop
Are you sure you would like to cancel your request to attend Ontario’s Managing Digital Risks in the Broader Public Sector conference?

Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence Gérer les risques numériques dans le secteur parapublic de l’Ontario?

You will no longer be registered for this event, and will no longer receive communications from us. If you opted to attend in-person, your name will be removed from the list. If you have already received the virtual attendance link, you will still be able to access the conference virtually.

Please note that you are unable to re-register for the in-person portion of the conference online. If you would like to re-register, or if you have any further inquiries, please contact cybersecurityconference@ontario.ca.

Thank you,
Ontario’s Cyber Security Education & Centre of Excellence Team

Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications de notre part. Si vous aviez choisi de participer en personne, votre nom sera supprimé de la liste. Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand même accéder à la conférence de façon virtuelle.

Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si vous avez d’autres questions, veuillez communiquer avec cybersecurityconference@ontario.ca.

Merci,
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité

people on conference bell icon

Registration Status

You have requested to attend the Managing Digital Risks in the Broader Public Sector conference in-person. virtually.

Your status for the Managing Digital Risks in the Broader Public Sector conference is Approved Pending Approval Waitlisted Cancelled Denied


If you have any questions, please reach out to cybersecurityconference@ontario.ca.

Statut d’inscription

Vous avez demandé à assister à la conférence Gérer les risques numériques dans le secteur parapublic en personne. virtuellement.

Votre statut pour la conférence Gérer les risques numériques dans le secteur parapublic est Approuvé En attente d’approbation , Inscrit sur la liste d’attente Annulé Refusé


Si vous avez des questions, veuillez écrire à cybersecurityconference@ontario.ca.

Remarque
Veuillez noter que la version française des vidéos ne contient pas de voix off en français ; toutefois, une transcription en français est fournie pour référence.

Upcoming site outage for planned maintenance will begin on March 30th from 4:30 p.m. - 12:00 a.m. L’interruption du site prévues pour maintenance planifiée commencera le 30 mars de 16 h 30 à 12 h 00.

Cyber Security Ontario Cyber Security Ontario
  • English
    English Français
  • You are not logged in. (Log in)
  • Home
  • About us
  • Advisories
  • Expert Panel
  • Events
  • Resources
  • Home
  • Blogs
  • Videos
  • Quizzes
  • Knowledge Library
  • Learning Portal

Cyber Security Ontario Learning Portal

  1. Home
  2. Site pages
  3. Cyber Cindy's Phishing Frenzy - Part One

Cyber Cindy’s Phishing Frenzy Part One - Transcript

Narrator: Cindy has been working hard all week with the finance department, working on the fiscal year planning with the finance CAO. She is feeling very overworked and reminds herself that she needs to take a break. Cindy decides to stretch and do some online shopping on her computer to relax.

Anon: Chris revealing so much information about his company is very, very good. All I need to do now is create a list of targets using INFO-GO, the organization's public directory, to contacts his co-workers, email addresses and phone numbers. I'll create a phishing email, vishing phone call, and smishing text message to try and convince the employees at the health facility to click on the link. That will take them to my very special webpage, which will try to get more information from them. All of this will form the basis of an even greater attack. Oh, I know Phish. I can't hardly contain my excitement too.

Narrator: While scrolling the Internet and shopping online, Cindy gets an email notification on her desktop. She clicks on the email and notices she has won a $50 Starbucks gift card. Cindy jumps up from her desk, excited about having no shortage of caffeine. With all this work she has piling up, she is going to need the extra coffee.

Cindy opens the URL and comes across a web page which requires her to input her company information to redeem her prize. The web page has spelling mistakes and is asking for private information that it shouldn't need. Feeling like something is off, Cindy decides to just pay for her coffee herself, not wanting to risk anything. She closes the browser and deletes the email thinking it must be spam.

Anon: I can't wait to see who falls to my phishing campaign, Phish. Oh look. Here is one now. Someone named Cindy clicked the link, but she did not give up much information. Wait a second, our friend Cindy works in the finance department. Cindy, I think it's time you and I go spear phishing together… time to plot the next step in my attack! 

◄ CSAM 2022 Fight the Phish! (Week 2)
Cyber Cindy's Phishing Frenzy - Part Two ►
You are not logged in. (Log in)
Home
  • English
    • English
    • Français
Data retention summary
Get the mobile app
Supported by the Government of Ontario © King’s Printer for Ontario, 2012–23 | Terms of Use | AODA Inquiries
Soutenu par le gouvernement de l'Ontario © Imprimeur du Roi pour l’Ontario, 2012–23 | Conditions d’utilisation | Demandes de l'AODA
CSAM Supported by the Government of Ontario
© Queen's Printer for Ontario, 2012–21 | Terms of Use | AODA Inquiries
Cyber Security Awareness Month Footer Logo
CSAM Soutenu par le gouvernement de l'Ontario
© Imprimeur de la Reine pour l’Ontario, 2012‑21 | Conditions d’utilisation | Demandes de l'AODA
Logo de bas de page du mois de la sensibilisation à la cybersécurité